CVE-2024-1536
📋 TL;DR
This vulnerability allows authenticated WordPress users with contributor-level permissions or higher to inject malicious scripts into pages using the Essential Addons for Elementor plugin's event calendar widget. The scripts are stored and execute whenever other users view the compromised pages, enabling persistent cross-site scripting attacks. All WordPress sites using vulnerable versions of this plugin are affected.
💻 Affected Systems
- Essential Addons for Elementor WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, hijack user sessions, deface websites, redirect users to malicious sites, or install backdoors for persistent access.
Likely Case
Malicious actors inject scripts to steal user cookies/sessions, display fraudulent content, or redirect users to phishing pages.
If Mitigated
With proper user role management and content review, impact is limited to potential defacement or minor script injection on non-critical pages.
🎯 Exploit Status
Exploitation requires contributor-level WordPress access. The vulnerability is straightforward to exploit once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.9.10
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3037755/essential-addons-for-elementor-lite/tags/5.9.10/includes/Elements/Event_Calendar.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Essential Addons for Elementor'. 4. Click 'Update Now' if available, or download version 5.9.10+ from WordPress repository. 5. Activate the updated plugin.
🔧 Temporary Workarounds
Disable Event Calendar Widget
allTemporarily disable the vulnerable event calendar widget until patching is possible.
Restrict Contributor Permissions
allTemporarily remove contributor-level users or restrict their publishing capabilities.
🧯 If You Can't Patch
- Implement strict content review process for all contributor submissions
- Install and configure a Web Application Firewall (WAF) with XSS protection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Essential Addons for Elementor → Version. If version is 5.9.9 or lower, you are vulnerable.
Check Version:
wp plugin list --name='essential-addons-for-elementor' --field=version
Verify Fix Applied:
After updating, verify the plugin version shows 5.9.10 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to event calendar endpoints
- Multiple content updates from contributor accounts
- Script tags containing event calendar attributes in page content
Network Indicators:
- Unexpected JavaScript execution on pages containing event calendar widgets
- External resource loads from event calendar content
SIEM Query:
source="wordpress" AND (event_type="plugin_update" AND plugin_name="essential-addons-for-elementor" AND version<="5.9.9") OR (event_type="content_update" AND user_role="contributor" AND content LIKE "%event-calendar%")
🔗 References
- https://plugins.trac.wordpress.org/changeset/3037755/essential-addons-for-elementor-lite/tags/5.9.10/includes/Elements/Event_Calendar.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/12dc9e63-17bb-4755-be3c-ae8b26edd3cd?source=cve
- https://plugins.trac.wordpress.org/changeset/3037755/essential-addons-for-elementor-lite/tags/5.9.10/includes/Elements/Event_Calendar.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/12dc9e63-17bb-4755-be3c-ae8b26edd3cd?source=cve